Strategy 1
*Testing for timing, high reliability and performance.
Reasons.
Every device and system configuration must be tested including the software setup,definitions and rules must be tested with an attempt to force the system and its intergrals to fail. Every failure(if there are any) must be evaluated and errors corrected.
Strategy 2
*Measuring response levels at the lowest set point of the alarm.
Reasons.
This is to check the trigger points of the alarms in the system and the response must be recorded as well as changing the intervals of alarm triggers so as to evaluate the time taken for the alarm to respond at the lowest point of it to be triggered.
3, I think. I hope that is right!
Answer:
The answer is True
Explanation:
Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.
When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.